Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 285-287.doi: 10.11896/j.issn.1002-137X.2016.6A.068

Previous Articles     Next Articles

Simulation and Analysis of AODV Protocol in Fishing Marine VHF Ad Hoc Network

SHEN Dan-dan, WANG Li-hua, WANG Yu and WANG Zhen-zhou   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In order to verify the feasibility of AODV protocol in fishing marine VHF Ad Hoc network and research its working performance,the simulation soft tool OPNET was used in the article,and the packet delivering rate,average delay,normalized routing load and mean hops were chosen to evaluate the performance of the AODV.Then the effects of these parameters on the performance were analyzed by changing the network size and the mobile speed of the node.The simulation result indicates that the AODV is suitable to the small scale fishing marine VHF Ad Hoc network in which the speed of boat is within 10m/s.The paper summaried the problems of AODV protocol and gave some advice to improve protocol working performance.

Key words: Fishing marine VHF communication system,Ad hoc network,AODV routing protocol,Routing protocol simulation

[1] 农业部渔政指挥中心编.渔业安全通信手册(上)[M].北京:中国农业出版社,2010
[2] 农业部渔政指挥中心编.渔业安全通信手册(下)[M].北京:中国农业出版社,2010
[3] 刘欢,李楠.海上超短波环境的无线自组织网路由协议研究[J].舰船电子工程,2012,2(3):17-19
[4] 张怡,汪学明.按需路由协议AODV的安全性改进与仿真[J].通信技术,2011,4(8):124-126
[5] 周鹏.基于链路稳定性加权的车载自组网按需路由协议[J].计算机应用研究,2015,2(6):1811-1815
[6] 周胶,田杰,戴晨铖,等.战术MANET中基于链路可用时间的AODV路由协议研究[J].计算机工程与科学,2013,5(12):96-101
[7] 李保珠,高宪军,李娜,等.AODV-FABL路由协议的优化及其军事应用[J].吉林大学学报(信息科学版),2014,2(1):106-111
[8] 何绵禄,褚伟,刘辉舟,等.AODV路由协议的研究和改进[J].计算机工程,2015,1(1):110-114,0
[9] 郝聚涛,赵晶晶,李明禄,等.基于能量和链路状态的AODV路由请求转发机制研究[J].计算机科学,2009,6(7):68-70,6
[10] 高嵩.OPNET Modeler仿真建模大解密[M].北京:电子工业出版社,2010

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .